Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2025.7183.1
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-7183-1)
Summary:The remote host is missing an update for the 'linux, linux-lts-xenial' package(s) announced via the USN-7183-1 advisory.
Description:Summary:
The remote host is missing an update for the 'linux, linux-lts-xenial' package(s) announced via the USN-7183-1 advisory.

Vulnerability Insight:
Andy Nguyen discovered that the Bluetooth L2CAP implementation in the Linux
kernel contained a type-confusion error. A physically proximate remote
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2020-12351)

Andy Nguyen discovered that the Bluetooth A2MP implementation in the Linux
kernel did not properly initialize memory in some situations. A physically
proximate remote attacker could use this to expose sensitive information
(kernel memory). (CVE-2020-12352)

Andy Nguyen discovered that the Bluetooth HCI event packet parser in the
Linux kernel did not properly handle event advertisements of certain sizes,
leading to a heap-based buffer overflow. A physically proximate remote
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2020-24490)

Ziming Zhang discovered that the VMware Virtual GPU DRM driver in the Linux
kernel contained an integer overflow vulnerability. A local attacker could
use this to cause a denial of service (system crash). (CVE-2022-36402)

Zheng Wang discovered a use-after-free in the Renesas Ethernet AVB driver
in the Linux kernel during device removal. A privileged attacker could use
this to cause a denial of service (system crash). (CVE-2023-35827)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- GPU drivers,
- I2C subsystem,
- Network drivers,
- Pin controllers subsystem,
- TTY drivers,
- USB Mass Storage drivers,
- Framebuffer layer,
- Ext4 file system,
- File systems infrastructure,
- Bluetooth subsystem,
- Kernel init infrastructure,
- DMA mapping infrastructure,
- Memory management,
- 9P file system network protocol,
- IPv4 networking,
- IPv6 networking,
- Logical Link layer,
- MAC80211 subsystem,
- Netfilter,
- NFC subsystem,
- Phonet protocol,
- Network traffic control,
- Wireless networking,
(CVE-2024-44947, CVE-2023-52594, CVE-2024-35886, CVE-2024-38633,
CVE-2023-52509, CVE-2024-26625, CVE-2024-36946, CVE-2024-45021,
CVE-2024-36270, CVE-2021-47118, CVE-2024-43884, CVE-2024-36941,
CVE-2024-38619, CVE-2021-47501, CVE-2024-49967, CVE-2024-42090,
CVE-2024-40912, CVE-2024-36968, CVE-2024-53057, CVE-2023-52507,
CVE-2024-42101, CVE-2021-47086, CVE-2024-42153, CVE-2024-40959,
CVE-2024-26777, CVE-2024-44944, CVE-2024-43856, CVE-2024-39301)

Affected Software/OS:
'linux, linux-lts-xenial' package(s) on Ubuntu 14.04, Ubuntu 16.04.

Solution:
Please install the updated package(s).

CVSS Score:
5.8

CVSS Vector:
AV:A/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2020-12351
http://packetstormsecurity.com/files/162131/Linux-Kernel-5.4-BleedingTooth-Remote-Code-Execution.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html?wapkw=CVE-2020-12351
Common Vulnerability Exposure (CVE) ID: CVE-2020-12352
http://packetstormsecurity.com/files/161229/Kernel-Live-Patch-Security-Notice-LSN-0074-1.html
Common Vulnerability Exposure (CVE) ID: CVE-2020-24490
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html
Common Vulnerability Exposure (CVE) ID: CVE-2021-47086
https://git.kernel.org/stable/c/0bbdd62ce9d44f3a22059b3d20a0df977d9f6d59
https://git.kernel.org/stable/c/311601f114859d586d5ef8833d60d3aa23282161
https://git.kernel.org/stable/c/48c76fc53582e7f13c1e0b11c916e503256c4d0b
https://git.kernel.org/stable/c/52ad5da8e316fa11e3a50b3f089aa63e4089bf52
https://git.kernel.org/stable/c/53ccdc73eedaf0e922c45b569b797d2796fbaafa
https://git.kernel.org/stable/c/75a2f31520095600f650597c0ac41f48b5ba0068
https://git.kernel.org/stable/c/982b6ba1ce626ef87e5c29f26f2401897554f235
https://git.kernel.org/stable/c/b10c7d745615a092a50c2e03ce70446d2bec2aca
Common Vulnerability Exposure (CVE) ID: CVE-2021-47118
https://git.kernel.org/stable/c/0711f0d7050b9e07c44bc159bbc64ac0a1022c7f
https://git.kernel.org/stable/c/2cd6eedfa6344f5ef5c3dac3aee57a39b5b46dff
https://git.kernel.org/stable/c/4dbd8808a591b49b717862e6e0081bcf14a87788
https://git.kernel.org/stable/c/7178be006d495ffb741c329012da289b62dddfe6
https://git.kernel.org/stable/c/764c2e892d1fe895392aff62fb353fdce43bb529
https://git.kernel.org/stable/c/b8ff869f20152fbe66b6c2e2715d26a2f9897cca
https://git.kernel.org/stable/c/d106f05432e60f9f62d456ef017687f5c73cb414
https://git.kernel.org/stable/c/f86c80515a8a3703e0ca2e56deb50fc2879c5ea4
Common Vulnerability Exposure (CVE) ID: CVE-2021-47501
https://git.kernel.org/stable/c/16431e442db248ecd8aa9457cf0a656f1885f56e
https://git.kernel.org/stable/c/23ec111bf3549aae37140330c31a16abfc172421
https://git.kernel.org/stable/c/e5b7fb2198abc50058f1a29c395b004f76ab1c83
Common Vulnerability Exposure (CVE) ID: CVE-2022-36402
https://bugzilla.openanolis.cn/show_bug.cgi?id=2072
Common Vulnerability Exposure (CVE) ID: CVE-2023-35827
https://lore.kernel.org/lkml/cca0b40b-d6f8-54c7-1e46-83cb62d0a2f1@huawei.com/T/
https://www.spinics.net/lists/netdev/msg886947.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-52507
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
Common Vulnerability Exposure (CVE) ID: CVE-2023-52509
https://git.kernel.org/stable/c/105abd68ad8f781985113aee2e92e0702b133705
https://git.kernel.org/stable/c/3971442870713de527684398416970cf025b4f89
https://git.kernel.org/stable/c/616761cf9df9af838c0a1a1232a69322a9eb67e6
https://git.kernel.org/stable/c/65d34cfd4e347054eb4193bc95d9da7eaa72dee5
https://git.kernel.org/stable/c/6f6fa8061f756aedb93af12a8a5d3cf659127965
https://git.kernel.org/stable/c/db9aafa19547833240f58c2998aed7baf414dc82
Common Vulnerability Exposure (CVE) ID: CVE-2023-52594
https://git.kernel.org/stable/c/25c6f49ef59b7a9b80a3f7ab9e95268a1b01a234
https://git.kernel.org/stable/c/2adc886244dff60f948497b59affb6c6ebb3c348
https://git.kernel.org/stable/c/84770a996ad8d7f121ff2fb5a8d149aad52d64c1
https://git.kernel.org/stable/c/9003fa9a0198ce004b30738766c67eb7373479c9
https://git.kernel.org/stable/c/be609c7002dd4504b15b069cb7582f4c778548d1
https://git.kernel.org/stable/c/e4f4bac7d3b64eb75f70cd3345712de6f68a215d
https://git.kernel.org/stable/c/f11f0fd1ad6c11ae7856d4325fe9d05059767225
https://git.kernel.org/stable/c/f44f073c78112ff921a220d01b86d09f2ace59bc
Common Vulnerability Exposure (CVE) ID: CVE-2024-26625
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
Common Vulnerability Exposure (CVE) ID: CVE-2024-26777
https://git.kernel.org/stable/c/1d11dd3ea5d039c7da089f309f39c4cd363b924b
https://git.kernel.org/stable/c/6db07619d173765bd8622d63809cbfe361f04207
https://git.kernel.org/stable/c/84246c35ca34207114055a87552a1c4289c8fd7e
https://git.kernel.org/stable/c/99f1abc34a6dde248d2219d64aa493c76bbdd9eb
https://git.kernel.org/stable/c/cd36da760bd1f78c63c7078407baf01dd724f313
https://git.kernel.org/stable/c/df6e2088c6f4cad539cf67cba2d6764461e798d1
https://git.kernel.org/stable/c/e421946be7d9bf545147bea8419ef8239cb7ca52
https://git.kernel.org/stable/c/f329523f6a65c3bbce913ad35473d83a319d5d99
Common Vulnerability Exposure (CVE) ID: CVE-2024-35886
https://git.kernel.org/stable/c/167d4b47a9bdcb01541dfa29e9f3cbb8edd3dfd2
https://git.kernel.org/stable/c/40a344b2ddc06c1a2caa7208a43911f39c662778
https://git.kernel.org/stable/c/4a7c465a5dcd657d59d25bf4815e19ac05c13061
https://git.kernel.org/stable/c/9472d07cd095cbd3294ac54c42f304a38fbe9bfe
https://git.kernel.org/stable/c/9c5258196182c25b55c33167cd72fdd9bbf08985
https://git.kernel.org/stable/c/d21d40605bca7bd5fc23ef03d4c1ca1f48bc2cae
https://git.kernel.org/stable/c/f2dd75e57285f49e34af1a5b6cd8945c08243776
https://git.kernel.org/stable/c/fd307f2d91d40fa7bc55df3e2cd1253fabf8a2d6
Common Vulnerability Exposure (CVE) ID: CVE-2024-36270
https://git.kernel.org/stable/c/07eeedafc59c45fe5de43958128542be3784764c
https://git.kernel.org/stable/c/10f0af5234dafd03d2b75233428ec3f11cf7e43d
https://git.kernel.org/stable/c/21a673bddc8fd4873c370caf9ae70ffc6d47e8d3
https://git.kernel.org/stable/c/570b4c52096e62fda562448f5760fd0ff06110f0
https://git.kernel.org/stable/c/6fe5af4ff06db3d4d80e07a19356640428159f03
https://git.kernel.org/stable/c/819bfeca16eb9ad647ddcae25e7e12c30612147c
https://git.kernel.org/stable/c/caf3a8afb5ea00db6d5398adf148d5534615fd80
Common Vulnerability Exposure (CVE) ID: CVE-2024-36941
https://git.kernel.org/stable/c/244822c09b4f9aedfb5977f03c0deeb39da8ec7d
https://git.kernel.org/stable/c/327382dc0f16b268950b96e0052595efd80f7b0a
https://git.kernel.org/stable/c/5a730a161ac2290d46d49be76b2b1aee8d2eb307
https://git.kernel.org/stable/c/801ea33ae82d6a9d954074fbcf8ea9d18f1543a7
https://git.kernel.org/stable/c/97792d0611ae2e6fe3ccefb0a94a1d802317c457
https://git.kernel.org/stable/c/ad12c74e953b68ad85c78adc6408ed8435c64af4
https://git.kernel.org/stable/c/b0db4caa10f2e4e811cf88744fbf0d074b67ec1f
https://git.kernel.org/stable/c/f92772a642485394db5c9a17bd0ee73fc6902383
Common Vulnerability Exposure (CVE) ID: CVE-2024-36946
https://git.kernel.org/stable/c/4ff334cade9dae50e4be387f71e94fae634aa9b4
https://git.kernel.org/stable/c/728a83160f98ee6b60df0d890141b9b7240182fe
https://git.kernel.org/stable/c/9a77226440008cf04ba68faf641a2d50f4998137
https://git.kernel.org/stable/c/d8cac8568618dcb8a51af3db1103e8d4cc4aeea7
https://git.kernel.org/stable/c/dc6beac059f0331de97155a89d84058d4a9e49c7
https://git.kernel.org/stable/c/ec1f71c05caeba0f814df77e0f511d8b4618623a
https://git.kernel.org/stable/c/ee9e39a6cb3ca2a3d35b4ae25547ee3526a44d00
https://git.kernel.org/stable/c/f085e02f0a32f6dfcfabc6535c9c4a1707cef86b
Common Vulnerability Exposure (CVE) ID: CVE-2024-36968
https://git.kernel.org/stable/c/4d3dbaa252257d20611c3647290e6171f1bbd6c8
https://git.kernel.org/stable/c/a5b862c6a221459d54e494e88965b48dcfa6cc44
https://git.kernel.org/stable/c/ad3f7986c5a0f82b8b66a0afe1cc1f5421e1d674
https://git.kernel.org/stable/c/d2b2f7d3936dc5990549bc36ab7ac7ac37f22c30
https://git.kernel.org/stable/c/dfece2b4e3759759b2bdfac2cd6d0ee9fbf055f3
Common Vulnerability Exposure (CVE) ID: CVE-2024-38619
https://git.kernel.org/stable/c/16637fea001ab3c8df528a8995b3211906165a30
https://git.kernel.org/stable/c/24bff7f714bdff97c2a75a0ff6a368cdf8ad5af4
https://git.kernel.org/stable/c/2cc32639ec347e3365075b130f9953ef16cb13f1
https://git.kernel.org/stable/c/e0e2eec76920a133dd49a4fbe4656d83596a1361
Common Vulnerability Exposure (CVE) ID: CVE-2024-38633
https://git.kernel.org/stable/c/21a61a7fbcfdd3493cede43ebc7c4dfae2147a8b
https://git.kernel.org/stable/c/361a92c9038e8c8c3996f8eeaa14522a8ad90752
https://git.kernel.org/stable/c/712a1fcb38dc7cac6da63ee79a88708fbf9c45ec
https://git.kernel.org/stable/c/9db4222ed8cd3e50b81c8b910ae74c26427a4003
https://git.kernel.org/stable/c/b6eb7aff23e05f362e8c9b560f6ac5e727b70e00
https://git.kernel.org/stable/c/e8a10089eddba40d4b2080c9d3fc2d2b2488f762
https://git.kernel.org/stable/c/e8e2a4339decad7e59425b594a98613402652d72
https://git.kernel.org/stable/c/fa84ca78b048dfb00df0ef446f5c35e0a98ca6a0
Common Vulnerability Exposure (CVE) ID: CVE-2024-39301
Common Vulnerability Exposure (CVE) ID: CVE-2024-40912
Common Vulnerability Exposure (CVE) ID: CVE-2024-40959
Common Vulnerability Exposure (CVE) ID: CVE-2024-42090
Common Vulnerability Exposure (CVE) ID: CVE-2024-42101
Common Vulnerability Exposure (CVE) ID: CVE-2024-42153
Common Vulnerability Exposure (CVE) ID: CVE-2024-43856
Common Vulnerability Exposure (CVE) ID: CVE-2024-43884
Common Vulnerability Exposure (CVE) ID: CVE-2024-44944
Common Vulnerability Exposure (CVE) ID: CVE-2024-44947
Common Vulnerability Exposure (CVE) ID: CVE-2024-45021
Common Vulnerability Exposure (CVE) ID: CVE-2024-49967
Common Vulnerability Exposure (CVE) ID: CVE-2024-53057
CopyrightCopyright (C) 2025 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.